Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add defaults for expr and description to prevent spurious diffs #11656

Conversation

modular-magician
Copy link
Collaborator

Fixes: #9084

Probably.

Problem sort of explained here (#9084 (comment)) where the state value seems to be changing between null & "" which causes the diff on the rule. Setting default values for both description & versioned_expr seems to fix this as far as I can tell

If this PR is for Terraform, I acknowledge that I have:

  • Searched through the issue tracker for an open issue that this either resolves or contributes to, commented on it to claim it, and written "fixes {url}" or "part of {url}" in this PR description. If there were no relevant open issues, I opened one and commented that I would like to work on it (not necessary for very small changes).
  • Generated Terraform, and ran make test and make lint to ensure it passes unit and linter tests.
  • Ensured that all new fields I added that can be set by a user appear in at least one example (for generated resources) or third_party test (for handwritten resources or update tests).
  • Ran relevant acceptance tests (If the acceptance tests do not yet pass or you are unable to run them, please let your reviewer know).
  • Read the Release Notes Guide before writing my release note below.

Release Note Template for Downstream PRs (will be copied)

compute: fixed extra diffs generated on `google_security_policy` `rules` when modifying a rule

Derived from GoogleCloudPlatform/magic-modules#5997

…icorp#5997)

* Add defaults for expr and description to prevent spurious diffs

* Handwritten instead

Signed-off-by: Modular Magician <magic-modules@google.com>
@modular-magician modular-magician merged commit 25bf499 into hashicorp:main May 6, 2022
@github-actions
Copy link

github-actions bot commented Jun 6, 2022

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Jun 6, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

google_compute_security_policy rules are always recreated if they have a match expr set
1 participant